CN102117463A - System and method for providing user control of the user's network usage data and personal profile information - Google Patents

System and method for providing user control of the user's network usage data and personal profile information Download PDF

Info

Publication number
CN102117463A
CN102117463A CN2010106149774A CN201010614977A CN102117463A CN 102117463 A CN102117463 A CN 102117463A CN 2010106149774 A CN2010106149774 A CN 2010106149774A CN 201010614977 A CN201010614977 A CN 201010614977A CN 102117463 A CN102117463 A CN 102117463A
Authority
CN
China
Prior art keywords
data
user
personal
end points
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010106149774A
Other languages
Chinese (zh)
Inventor
李伟叶
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Here Global BV
Original Assignee
Navteq North America LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Navteq North America LLC filed Critical Navteq North America LLC
Publication of CN102117463A publication Critical patent/CN102117463A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0251Targeted advertisements
    • G06Q30/0257User requested
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0251Targeted advertisements
    • G06Q30/0269Targeted advertisements based on user profile or attribute
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0421Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • H04L67/306User profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/535Tracking the activity of the user
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Abstract

Provided are systems and methods for providing user control of the user's network usage data and personal profile information, concretely, systems and methods for tracking a user's usage of resources on the Internet under the user's control, and for controlling the distribution of the user's usage data. A personal data endpoint is configured to operate on a computer that is connected to the Internet. The personal data endpoint includes a network data interface configured to receive data communicated to and from a user of at least one personal application. The at least one personal application is configured to send and receive data over the Internet. A usage data logger stores usage data from the received data, and stores the usage data in a usage data log. A usage data filter is configured to control communication of the usage data over the Internet and to inhibit communication of information identifying the user over the Internet.

Description

The system and method that the user who provides network to use data and profile information controls
Technical field
The present invention relates to provide the system and method that user's network is used user's control of data and personal profiles (personal profile) information.
Background technology
The Internet has become complete market.The resource that the Internet provides research products ﹠ services, purchase product or service and paid.About online study and purchase, the Internet provides search engine and to the visit of bulk information to the user.The Internet also is provided for their media that product are provided of ever-increasing audient's advertisement to the products ﹠ services provider.The media content provider is published in their medium on the worldwide website of their patronage.Described media content provider or more specifically, is comprising the space that advertisement is provided on the webpage of media content also on their website.
Search engine and such as the traditional media publisher of the New York Times, Wall Street Journal and CNN.The media content provider relies on the source of advertisement as income.Because the media content provider has anyone of website, various enterprises and individuals rely on advertisement on the network as the source of income.
Bigger medium provider has stimulated the growth of advertisement on the Internet.Themselves Advertisement Server (Ad Server) had been bought in maximum website, and have themselves manage ad sales team.Advertisement Server has developed the mode that becomes the managing advertisement content and has produced income and the success of monitoring of advertisement war (advertisement campaign) or the mechanism of failure.Along with advertising network (AdNetwork) has occurred and has offered the one-stop widely shopping in advertisement side (one-stop-shop), so, Advertisement Server declines, the substitute is advertising network, it provides the visit of Advertisement Server and eliminates the enterprise of needs that content site is managed themselves ad sales team.Advertising network has also reduced the little content providers of picture blog user (blogger) and the littler desired investment in advertising in website significantly.Double-clicking (Doubleclick) is an example of advertising network, and it has produced the business that visit is provided to Advertisement Server.Doubleclick and analog thereof even online marketplace resource such as the successful method of the strategy of online advertisement war and monitoring of advertisement war can be provided.Developed themselves Advertisement Server such as some medium providers of Google, and their Advertisement Server can be provided to other medium provider.
Want to carry out the product of online advertisement or serve the provider and can reach an agreement with the media content provider.Described medium provider can provide Advertisement Server, or obtains the access right as third party's Advertisement Server in the source of the ad content on its webpage.Can in the time will on webpage, putting up described advertisement, visit ad content at every turn.For example, when the computer user visits the website of being supported by the media content provider, can comprise the advertisement link of the embedding of the ad content on " sensing " Advertisement Server to the described webpage of user's download.When user's computer received the link of described embedding, described link was used to ask the ad content from Advertisement Server.
Media content provider and advertisement side make advertisement be directed to audient's method on environment in searching for a long time always.Various tool has been developed and has been used to the environment specific aim that provides such.An example of this instrument is " cookie ".Cookie is the identifier that the network provider is used to follow the tracks of the uniqueness of using user's the Internet.Cookie can only be as the identifier of numeral or by Advertisement Server be installed on the user's computer text-string or with any other entity of telex network.Described Advertisement Server with the cookie identifier according to specific user archive.When this user was connected to specific website or Advertisement Server, described cookie was included in and allows Advertisement Server that the user is connected in the connection request that the number of times of described specific website counts.Described Advertisement Server will be by the user's of described cookie identifier sign use data storage, and does further to analyze.For example, described user's the Internet uses and can be carried out trend analysis, its indication user interest and such as purchase intention, interested products ﹠ services, pay user's commercial activity of frequency or the interested any further feature in online marketplace by mails.
In another example, Advertisement Server can be associated with the search engine such as Google.Described search engine can be followed the tracks of user's search terms (by for example cookie), and analyzes certain indication with the commercial activity that obtains described user of described search terms.
Ad ware (Adware) has also developed a kind of mode that becomes targeted advertisement.Ad ware is to operate on user's the equipment and produce a kind of software program of advertisement along with application.Described advertisement can be shown as banner, pop-up window or other show tools arbitrarily.In case be embedded in the subscriber equipment, ad ware can use and adjusts the advertisement that is shown to the user based on user's the Internet.
Provide Advertisement Server, ad ware, advertising network and other current techniques of advertisement can introduce the risk of privacy of user and safety in the electronics mode.At first, described user does not almost select or control about the demonstration of advertisement on the subscriber equipment.Current technology the user not do not select or even ignorant situation under cookies and other ad tools are installed on subscriber equipment.The user may agree to use ad ware to exchange the low purchasing price of application-specific for.Yet described user still lacks the content of their private information and the control of use.Described user's private information and use information can also be visited or transmit to current techniques under unauthorized or even user's condition of unknown.Only use the propaganda of data just may produce significant risk.Advertising network uses described user's use data, and has the anonymous ability of separating, and it can depend on the personal information that is exposed and determine personal identification with pin-point accuracy.Current techniques also stands such risk, comprises spyware or Malware or Trojan Horse or other software arbitrarily, and it is moving on equipment the user under ignorant situation of user, thereby carries out harmful or potential harmful task arranged to the user.
Existence is exposed to cookies and other software as the identifying information of IP address in order to limited subscriber.Yet in cookies, user and advertisement side have lost targetedly and the therefore advantage of the advertisement related with the user of exchange by limit exposure.
Another problem that is used to be directed to consumer's current advertisement technology is: advertisement side is used to make their advertisement information is made contributions targetedly, lack control for the user fully.The data that advertisement side obtains are used relevant with user's the Internet.Described data are imported under the situation that does not have benefit by the website Collection and analysis for the user.Therefore, described user experiences to receive may almost not have the relevant advertisement of products ﹠ services of actual benefit with them, and perhaps, described user preference does not receive the advertisement of some type, or the advertisement of other type of preference.
Along with the user has increasing electronic communication mode, privacy risk on private information and the worry that lacks user's control are become more and more unfavorable.Subscriber equipment comprise may WWW (Web) or even the Internet outside communicate by letter such as cell phone, order the mobile device of wireless device, Wi-Fi equipment and other mobile device.For example, user's cell phone may receive undesired text message.Bluetooth and other agreement are used to create can use the point-to-point connection basis structure that the chance of further infringement privacy of user is provided to advertisement entity and the entity with malice.
Current online advertisement scheme is brought interests to marketing personnel, advertisement side and retailer at large, and the user is brought the risk of infringement or infringement.Existence is to the needs of such system and method, described system and method with by receive the advertisement that conforms to commercial activity with described user interest and other market information does not detract or even strengthen the mode of the commercial experience of described user's online, the control that the distribution of described user's use data and private information is carried out is provided to the user.
Summary of the invention
Consider the problems referred to above, provide to be used under user's control following the tracks of the system and method for distribution that described user's use data were used and controlled to the resource of user on network.In an example system, the personal data end points is arranged to and is being connected to the calculating hands-operation of public network.Described personal data end points comprises and is arranged to the network data interface of reception to the data of transmitting with the user who uses from least one individual.Described at least one individual uses to be arranged on public network and transmits and receive data.Usage data record device (logger) storage is from the use data of received data, and with described use data storage to using in the data logging.The user data filtrator is arranged to the transmission of the described use data of control on public network, and stops the information of transmitting the described user of identification on public network.
In another example, provide to be used to control the system that is stored in the distribution of the use data on the computing machine that is configured to be connected to public network in the electronics mode.Example system comprises that at least one is arranged to the individual who carries out user's business and uses.Described user's business is included in and sends request of data on the public data network and receive data.Described system also is included in the personal data end points of the calculating hands-operation that is configured to be connected to public network.Described personal data end points receive to the data of transmitting with the user who uses from least one individual, from received data, select to use data and with described use data storage to using in the data logging.The user data filtrator is controlled the transmission of described user data on public network, and stops the information of transmitting the described user of identification on public network.Based on the configurable rule collection, described user data filtrator is can be by user configured fully.
In another example, provide the method for the transmission of personal information on public network that is used to control the user.Exemplary method comprises connecting from the individual of for example web browser by network uses the receiving media request.Described medium request is the request to the media content that points to the third party's resource website of public network (as be connected to).With the recording storage of medium request in the user's who uses corresponding to described individual use data logging.In the described data of record, to third party's resource (as webpage) from New York Times website transmit as described in the medium request.Receive the medium request responding from third party's resource.Described response comprises advertisement or at least one ad data request of at least one embedding.Described ad data request will send personal information and ad-request.If the ad data request target is to be evaluated as advertising network or another server that privacy is invaded, then described system will stop communication, and prevent that personal information from flowing to this advertising network.Then, the user sees the content that they asked simply.If agreed to obtain advertisement from the ad data target if the ad data request target is considered to not be privacy is invaded or described user, then by this system, described ad data request is allowed to arrive the destination advertisement source.At this moment, ad data is returned described individual and uses and present to the user.
According to the following drawings and detailed description, those skilled in the art understands clear understanding other system of the present invention, method and feature.Purpose is to make that these additional system, method and features are included in this instructions, protect in the scope of the present invention and by claims.
Description of drawings
The example of the present invention that the following describes can be by understanding with reference to following accompanying drawing better.Assembly in the accompanying drawing is bi-directional scaling not necessarily, focuses on the explanation principle of the present invention.In the drawings, identical Ref. No. is indicated the appropriate section of different figure.
Figure 1A is the block diagram in the example of the system that carries out business on the Internet;
Figure 1B is the block diagram of the example of the personal data end points that uses in the system in Figure 1A;
Fig. 2 is the block diagram of another example of the system shown in Figure 1A;
Fig. 3 is the block diagram of another example of the system shown in Figure 1A;
Fig. 4 is the block diagram of another example of the system shown in Figure 1A;
Fig. 5 is the block diagram of another example of the system shown in Figure 1A;
Fig. 6 A is that explanation is carried out anonymous individual and used and follow the tracks of and the interleaving function process flow diagram of the operation of the example of synchronous method;
Fig. 6 B is the process flow diagram of operation of exemplary method of transmission of explanation control user's use data;
Fig. 6 C is the interleaving function process flow diagram that the operation of the personal data end points with Advertisement Server function is described;
Fig. 7 is that explanation carry out to use is followed the tracks of in the system that comprises the anonymity proxy server and the interleaving function process flow diagram of the operation of synchronous method.
Fig. 8 is that explanation carry out to use is followed the tracks of in the system that comprises outside personal data end points and the interleaving function process flow diagram of the operation of synchronous method.
Fig. 9 is that explanation carry out to use is followed the tracks of in the system that comprises outside personal data end points and anonymity proxy shown in Figure 3 and the interleaving function process flow diagram of the operation of synchronous method.
Embodiment
I, personal profiles system
Figure 1A is a block diagram of carrying out the system 100 of business on the Internet 110.Figure 1A has described user A and these two users' of user B operation.User A and user B use the individual who is connected to the Internet 110 by the network equipment to use 102 and 103 and carry out business.Described the Internet 110 can comprise that described user can be by the network structure of any appropriate or any public data network of protocol access.Described public network is that " public " is meant: any two can be available in the connection between the network entity of network communication.Though can use public data network arbitrarily in the example that the following describes, for illustrative purposes, mention " the Internet ".
User A and user B can with business comprise: shopping or visit such as the products ﹠ services information of advertisement and electronic product brochure or catalogue; And products ﹠ services are carried out on-line payment.User on the Internet 110 can obtain advertisement and other products/information on services from media content provider 116 and advertising network 112.Described media content provider 116 can be an actual product/serve the provider, or may comprise the web page contents and the medium of the advertisement link of embedding.The advertisement link of described embedding can comprise the link of the ad content, ad data request of embedding or the advertising media on advertising network 112 or other the addressable Advertisement Server.
User A can be connected to the medium that the Internet 110 and accessed web page content providers 116 are provided by using the individual to use 102, carries out online shopping, and for the purpose of description, it can be browser that described individual uses 102.User B can carry out online shopping by using similar individual to use 103.Described user (user A or user B) can begin shopping by be received in the advertisement link that embeds from the medium that web page contents provider 116 receives.Be provided at the information of the product/service in the advertising message that receives in the described media content to the user, and, described user can begin to be used to obtain the process of extraneous information or the process of guiding on-line payment by being chosen in available one or more links in the advertising message.
When the website of user's " visit " such as web page contents provider 116 website, described user sends media content request.Described web page contents provider 116 is by sending medium in response to described request.Described response can also comprise the advertisement link such as at least one embedding of advertisement that embeds or ad data request.Described ad data request can be configured to automatically be transmitted by individual's application of user, and perhaps, described ad data request can be selected to be transmitted by the user.Described ad data request can comprise the personal information that obtains from user's equipment and ad-request.In the example shown in Figure 1A, if described ad data request target is to be evaluated as advertising network or other server that privacy is invaded, then the configuration of user A stops the transmission of the personal information of user A to go to described advertising network.Then, described user sees the content that they ask simply.If described ad data request target is considered to not to be what privacy was invaded, if or described user agree to receive advertisement from described ad data target, then described ad data request is allowed to arrive the destination advertisement source by described system.At this moment, ad data is returned described individual and uses and present to user A.Yet user B lacks the protection that can use for user A.The personal information of user B will agree without user B or even the user B situation not knowing to transmit under be sent to described advertising network.
Described media content can also comprise that such as the user identifier of " cookies " or file web page contents provider 116 and advertising network 112 use the described online use that comes monitoring user such as the user identifier or the file of " cookies ".Described user identifier is carried in media content, and they self are installed in user's the hard disk of the network equipment.Certain media content can also comprise and is used to visit the file that comprises the desired information of web page contents provider and advertising network 112 and the Trojan Horse or the Malware of program.Other program that user identifier, " cookies ", Trojan Horse (Trojan) and being used to extracts from user's information all is being called as " using request of data side (usage data requestor) " down.
The type of desired information comprises such information when using this uses request of data side, its help media content provider 116 and advertising network 112 definite users' buying habit, product/service interest and can allow web page contents provider 116 and advertising network 112 consumer positionings to receive other any information of specific advertising message.Correspondingly, described user's use data can be processed, to produce the user profiles that comprises about user's information based on the use data.This information can comprise that user's buying habit, product/service interest, demographic information, the information and the user of company may preference keep privacy or any other personal information under user's control.Described web page contents provider 116 and advertising network 112 desired information are called as user's " use data " or user's " profile data " below.
Example system 100 shown in Figure 1A comprises that the individual with user A uses the 102 personal data end points 104 that are connected to the Internet 110.Described personal data end points 104 is by using 102 places and receive all flow directions and from the data of user A the individual, monitor that the individual uses 102 110 the connections to the Internet.Described personal data end points 104 with the recording storage of the website of user A visit to using in the data logging 106.The described personal data end points 104 described users' of protection personal information makes not to be distributed on the Internet 110 in undelegated mode.In example implementation, described personal data end points 104 can be arranged to the transmission of all personal information of elimination except the IP address of described user's the network equipment.The acting server pond of use such as Onion Router (TOR) can be passed through by anonymization in described IP address.
User B among Figure 1A is connected to the Internet 110 by access to the Internet (Internet Access) 105 under the situation that does not have personal data end points 104.Described access to the Internet 105 can be the server as Internet service provider (" ISP ") operation.Under the situation that does not have personal data end points 104, user B is subject to the influence of ad ware, cookies and other technology of the information of obtaining relevant user B by undelegated third party.For example, media content provider 116 can manage cookies on the subscriber equipment of user B, or receives the personal information from the user B of Trojan Horse in the subscriber equipment that is embedded in user B or spyware.Described media content provider 116 can with the information stores of user B in database as user B data 107.Similarly, advertising network 112 can be managed cookies on the subscriber equipment of user B, or receives the personal information from the user B of Trojan Horse in the subscriber equipment that is embedded in user B or spyware.Described advertising network 112 can with the information of user B and by to use data carry out information stores that the consumer behaviour analysis derived in database as user B data 109.Described media content provider 116 and advertising network 112 can authorize without user B or the ignorant situation of user B under at random betray or the information of dispatch user B.
System 100 among Figure 1A can also comprise be used for the anonymity proxy 114 that is connected between personal data end points 104 and the Internet.Described anonymity proxy 114 removes Internet Protocol (IP) address of user A from the communication information of user A, be sent to third party such as media content provider 116 and advertising network 112 to prevent it.When using described anonymity proxy 114, user A communicates by letter with the Internet 110 with anonymity proxy 114 by personal data end points 104.Described anonymity proxy 114 may be implemented as: be used on the Internet 110 cluster or the pond of acting server of communication by the network equipment of user A.
User A and user B can use and use 102,103 browser as the individual and carry out business.Described user's individual uses 102 and 103 and can also comprise email client, text message client, finance and accounting application, electrical form or be arranged to any other application from the access to the Internet data.The personal data end points 104 of user A can be used 102 with various individuals and be connected, to obtain and user's the shopping and the various data of purchase trend correlation.These data are stored in to be used in the data logging 106.
System 100 among Figure 1A can realize in a lot of different modes.For example, the user can operate the network equipment that is directly connected to the Internet 110 by Internet Service Provider (ISP).Described user's personal data end points 104 can be operated as acting server in user's the network equipment.Described ISP can also comprise the personal data end points 104 of user A, and it is as the acting server of quoting when the user is connected to the Internet 110 or the server of other type.Described user's the network equipment can also be by enterprise servers or is assembled certain other server that is used for process user connection of 110 to the Internet and is connected to the Internet 110.Described personal data end points 104 can be mounted, being to operate on other server that has connected of target at enterprise servers or with described task.Realize the option of system 100 below with reference to Fig. 2-5 more detailed description.
Figure 1B is the block diagram of the personal data end points 104 that can use in the system shown in Figure 1A 100.Personal data end points 104 among Figure 1B comprises first transmitter/receiver (" the transceiver ") 120a and the second transceiver 120b that is used for transmitting and receiving data between user and the Internet.The first transceiver 120a is connected to the user, and the second transceiver 120b is connected to the Internet.The individual of the described first transceiver 120a by the user uses 102 (seeing Figure 1A) and is connected to the user.Will be understood by those skilled in the art that Figure 1B has described transceiver 120a, the b logical expressions with 104 operations of personal data end points.Described personal data end points 104 can be used 102 same calculating hands-operation the described user's of operation individual.Described personal data end points 104 also can use 102 to operate the individual being connected to another calculating hands-operation of the employed computing machine of user.Similarly, described personal data end points 104 also can be directly or by one or more other computing machines and Internet traffic.The first transceiver 120a shown in Figure 1B is included in the individual and uses hardware net interface and the I/O hardware and software resource that signal post needs between 102 (no matter they are operated wherein) and personal data end points 104 softwares.Described actual hardware and software realize that details can comprise various solution known to a person of ordinary skill in the art, therefore, for brevity, omit more detailed description.
Described personal data end points 104 comprises usage data record device 124, user data filtrator 126 and user profiles assembly 130.Described usage data record device 124 is connected to the described first and second transceiver 120a, b, to receive from the user of the first transceiver 120a or from the data of the Internet of the second transceiver 120b.Described usage data record device 124 records are about the data of user in the content of visiting on the Internet.Described data are stored in to be used in the data logging 106 as using data.Described user data filtrator 126 is connected to the described first transceiver 120a and the second transceiver 120b, to control user's data and private information in the transmission on the Internet.Described user data filtrator 126 is with personal information and use data or ad-request removes in 110 the transmission from user to the Internet, and can stop and use request of data side or personal information 110 to be delivered to described user from the Internet.
User data filtrator 126 among Figure 1B comprises advertisement obstruction device 152 and uses request of data side's obstruction device 154.When the user had received the content of the advertisement link that comprises embedding, described advertisement obstruction device 152 stoped ad-request to be delivered to the communication of the first transceiver 120a from the user.Described use request of data side obstruction device 154 can be used to extract with delete with web page contents provider 116 110 the use request of data sides (seeing Figure 1A) that receive that are connected such as cookies from the Internet.
Personal data end points 104 among Figure 1B can also comprise user profiles assembly 130.Described user profiles assembly 130 can be used to dispose, administer and maintain the personal profiles that comprises from the use data of using data logging 106 and other and described user-dependent personal information.Described personal profiles comprises purchase that is used for analysis user and the data of doing shopping tendency.Described user profiles assembly 130 can comprise the instrument that is used to analyze described use data and the determined information of out of Memory that is provided by described use data and user is provided.
User profiles assembly 130 among Figure 1B comprises user profiles interface 132, user data parser 134, operation report maker 136, personal advertisement service 138, wish list maker 140, transaction bid (deal offer) manager 142, Sync Manager 144, ad revenue (ad revenue) manager 146 and uses request of data side's modifier 148.The input and output interface that described user profiles interface 132 can comprise menu-drive or the interactive list on the display and allow described user Control-Menu or interactive list on display such as keyboard, button, mouse and display.Described user can configuration preference, and specifies the access control to user's personal profiles information.Described user profiles interface 132 can also depend on control and other setting that described user provides, and the visit to the resource that is connected to the Internet is provided.By the visit to the Internet is provided, how use data, use data and other personal information that described user can control the user are passed to third party's resource, web page contents provider and Advertisement Server.Described user's personal profiles information can be stored in the storer shown in Figure 1B as personal profiles 150.Described personal profiles information can be stored with the form of encrypting, with the private ownership of the described information of further enhancing.
Information in the use data of described user data parser 134 process user or user's the personal profiles 150, and estimate described user's commerce or consumer behaviour. With other web page contents provider 116 employed famous consumer behaviour analysis tools.The result who analyzes or report can be stored in the database, and it comprises described user's personal profiles 150.
Described user's operation report maker 136 generations comprise the operation report about the information of user's commerce or consumer behaviour.Described operation report maker 136 can use the result of above-mentioned user data parser 134 generations, or the more raw data such as user's use data are provided.Report can be generated the network equipment that is used to be presented at the user, be used for printout or be used for transmitting on the Internet under the condition of user's domination.
Described personal advertisement service 138 personal profiles 150 based on above-mentioned user provide the request to advertising message.Described personal advertisement service 138 can be arranged to: safeguard cover with by use data or the determined user of information that in described user's personal profiles 150, comprises to the formation that links of the relevant ad content of the interest of products ﹠ services or the data storage mechanism of other type.When described user capture comprised the webpage of medium, described medium can comprise the advertisement link of embedding.When described user's individual uses 102 when receiving the advertisement link of embedding, described individual uses 102, and (or have to network and individual use other component software of 102 interface) automatically sends the request to ad content on the Internet 110.Advertising network 112 (among Figure 1A) receives the request to described ad content, and responds by sending ad content to described user.Described personal advertisement service 138 will be replaced by the user's request to ad content based on described user's interest with the advertisement link associated advertisement requests for content of described embedding.
Described wish list maker 140 is created and the tabulation (" wish list ") or the shopping of the interested product of maintenance customer/service are tabulated.Can use user's profile information or use data automatically to generate described wish list.Can also use menu, prompting or interactive electronic list, pass through to the interface of wish list maker 140, create described wish list by described user.Described wish list can be maintained, announce or optionally be delivered on the Internet 110 product provider and marketing personnel.Described wish list maker 140 provides the mode of transmission about the information of the type of user's interest products ﹠ services to the user, and the provider and the marketing personnel that make most probable satisfy user's request respond.Described wish list maker 140 can comprise: will allow the user to pay close attention to price, product details (depending on described product, such as size, color or the like) and the out of Memory such as expectation of described search.
Notice that described wish list maker 140 will be disclosed or do not comprised the personally identifiable information by in the wish list of transmitting on the Internet 110.Electronic market that described wish list maker 140 can exchange with the anonymity of the information of permission or announcement board or certain are similar to system's binding operation of exchange.
142 management of transaction bid manager are from can or transmitting the marketing personnel of transaction, bid or other relevant information in response to the transmission of user's wish list and reception and storage that provider's transaction is bid in response to described user's wish list.
The following process of described Sync Manager 144 management: will be stored in personal profiles 150 and use the user profiles in the data logging 106 and use data message and family to can be used to the user profiles of another equipment of on the Internet 110, communicating by letter synchronous with the use data message.For example, described user can use ambulatory handheld computing machine or smart phone or other portable computing device, and described portable set can comprise the mobile personal data end points that docks with described personal data end points 104 by for example Wi-Fi connection.Described portable set can comprise Sync Manager or processor, and is to allow the coordination exchange of information, up-to-date thereby permission user's the network equipment keeps.Further specify the example of the coordinate synchronization of the data between the equipment below with reference to Fig. 2-4.
The issuable income of ad-request that described ad revenue manager 146 management use personal advertisement service 138 to transmit.
The use request of data side that described use request of data side modifier 148 receives from the website.Before the application 102 that they is sent to the user, described use request of data side modifier 148 is revised described use request of data side based on the information in user's the personal profiles.For example, described use request of data side modifier 148 can eliminate cookies, Trojan Horse from communicating by letter between user and the public web site or other uses information inquiry facility arbitrarily, to stop their installations on subscriber equipment.
Described personal data end points 104 may be implemented as the computer program that is installed on any personal device.For example, described personal device can be such as the webserver that is used as network station (network station) or the network equipment of personal computer.Described personal device can also be such as the mobile device of mobile phone, portable computer, net book (netbook) or any mobile device that can communicate by letter on public network.In an example implementation, the individual that described personal data end points 104 is implemented as browser or similar type uses 102 plug-in unit or additional software components.Described personal data end points 104 can be included in the function of the reference Figure 1B explanation in the independent application all or some.Can also carry out described function by the component software of operating in the environment of the browser that is used to access the Internet 110 or any individual's application 102, described personal data end points 104 may be implemented as the acting server of the application of visit public network.Described personal data end points 104 can also use the client-server structure to realize, wherein, server section is operated on network server apparatus, and one or more client part is operated on the one or more user terminals such as personal computer (desk-top or portable) and portable handheld device.Below with reference to the various optional realizations of Fig. 2-5 explanation.
II, be used for controlling the system and method for the personal information of ecommerce
Fig. 2 is the block diagram of another example of the system shown in Figure 1A.System 200 among Fig. 2 comprises first subscriber equipment 202, second subscriber equipment 220, a plurality of media content provider 260 and a plurality of Advertisement Servers 270 that are connected to the Internet 250.Described first subscriber equipment 202 can be such as the personal computer of desktop computer, portable computer or the teller work station of other type, and it is configured as the user " mainly " or " primarily " of the content on the Internet 250 to be visited and operate.Described second subscriber equipment 220 also can be a computer equipment arbitrarily.In example shown in Figure 2, described second subscriber equipment 220 is mobile computers, as mobile hand-held device, handheld computer (for example, palm handheld device), smart phone, thinner laptops (" net book ") or cell phone.
Described first subscriber equipment 202 comprises at least one individual's application 204, personal data end points 208 and uses data logging 210.Described at least one individual uses 204 and comprise browser, e-mail applications, messages application (using as SMS) or other software application that allows the user to communicate by letter on the Internet 250.Described personal data end points 208 is component softwares, and it is the example of top personal data end points 104 with reference to Figure 1A and 1B explanation.Personal data end points 208 among Fig. 2 can be the annex of plug-in unit, e-mail program or messaging program of browser or the user computer program at running background when communicating by letter on the Internet 250.Described personal data end points 208 with user's use data storage to using in the data logging 210.
Described second subscriber equipment 220 comprises at least one mobile personal application 222, mobile personal data end points 226 and moves and use data logging 224.Described mobile personal uses 222 can comprise any application that is provided to the visit of the Internet 250 to the user.It can be browser or mini browser that described mobile personal uses 222, and it is configured to run on the mobile device.It can also be email client, messages application or other similar application arbitrarily that described mobile personal uses 222.The slim version (thin version) that described mobile personal data end points 226 can be the personal data end points 104 shown in Figure 1B, however described mobile personal data end points 226 can become more powerful and have more robustness along with mobile device.Described mobile personal data end points 226 can comprise that the usage data record that is enough to the user uses in the data logging 224 and in 212 functions with use data logging 210 synchronised in the described information and first subscriber equipment 202 mobile.Described mobile use data logging 224 can be maintained in the data-carrier store, the storer that its capacity can be used less than the use data logging 210 in first subscriber equipment 202 basically.Described mobile personal data end points 226 can be arranged to by uploading all use data to personal data end points 208, carries out the use data synchronization.If described second subscriber equipment 220 has enough storeies, then described mobile personal data end points 226 can be arranged to be carried out synchronously, supposes that wherein second subscriber equipment 220 and first subscriber equipment 202 all have the reflection (mirrored image) that uses data logging 210 and move the mirror image that uses the use data in the data logging 226.
System 200 among Fig. 2 allows the user to carry out business on the mobile device of the portable expansion of the primary computing environment that is used as the user on first subscriber equipment 202.Synchronous 212 by with first subscriber equipment 202, make on described second subscriber equipment 220, collect all to use data be available at middle position to the user.Fig. 2 has shown first and second subscriber equipmenies 202,220, yet extra subscriber equipment can be added the part as system among Fig. 2 200.
Fig. 3 is the block diagram of another example of the system shown in Figure 1A.System 300 among Fig. 3 comprises a plurality of subscriber equipment 302-1 to 302-n (subscriber equipment of the N shown in Fig. 3), is used for providing at the Internet 330 user's of subscriber equipment 302-1 to 302-n external proxy server 304.Described external proxy server 304 comprises corresponding to first personal data end points 310-1 of the first subscriber equipment 302-1 and first and uses data logging 308-1, uses data logging 308-2 and use data logging 308-n corresponding to n personal data end points 310-n and the n of n subscriber equipment 302-n corresponding to the second personal data end points 310-2 and second of the second subscriber equipment 302-2.
System 300 among Fig. 3 can be the example of the system of enterprise's realization.Enterprise uses described external proxy server 304 to come master control (host) user's Internet service.Described external proxy server 304 main control software assemblies, it is operating as personal data end points 310-1 to 310-n and uses data logging 308-1 to 308-n.The user can use the individual to use 306-1 to 306-n and be connected to the Internet 330 from subscriber equipment 302-1 to 302-n.Carry out described user connection of 330 by personal data end points 310-1 to 310-n to the Internet.Described personal data end points 310-1 to 310-n provides usage data record function and ad content control function, as top with reference to as described in the figure 1B.For example, described personal data end points 310-1 to 310-n storage is corresponding to the user's of subscriber equipment 302-1 to 302-n use data.In addition, for example, described personal data end points 310-1 to 310-n can delete or rewrite cookies, or stops or reconfigure the request that links corresponding ad content the media content that receives with website from the Internet 330.Described personal data end points 310-1 to 310-n also bans use of data or other personal information to distribute on the Internet 330 in the undelegated mode of user.
Described external proxy server 304 can also comprise external security access function 320, and it can not receive user's IP address by the resource that is connected to of supposition user, and offers the user to the safer visit in the Internet 330.
Described external proxy server 304 can be arranged to enterprise and provide to the control of user's use data or to the shared control of user's use data.Described enterprise can realize ad revenue, and can select to share with the user described income.For example, described enterprise can support or provide the Advertisement Server resource, and its basis is operated by the user's of described external proxy server 304 access the Internet user profiles.Described external proxy server 304 may be implemented as a plurality of computing machines, and it is configured to the Resource Server such as server zone in the network structure that is installed in one or more buildingss (server farm) or server node.Described external proxy server 304 can be used for the system 300 of Fig. 3 by Internet Service Provider.Any enterprise that described external proxy server 304 can also be used as the part in the described enterprise computer network structure is used for the system 300 of Fig. 3.
Fig. 4 is the block diagram of another example of the system shown in Figure 1A.Described system 400 comprises a plurality of subscriber equipment 402-1 to 402-n that are connected to external agent's end points 416, and it is provided to the visit of the Internet 450 to the user.The user uses subscriber equipment 402-1 to 402-n to visit the Internet 450, and each subscriber equipment 402-1 to 402-n comprises that the individual uses 404-1 to 404-n, inner personal data end points 408-1 to 408-n and uses data logging 406-1 to 406-n.Described inner personal data end points 408-1 to 408-n is " inner ", and wherein, they are operated in subscriber equipment 402-1 to 402-n.The user also can use mobile subscriber equipment 402-1 ' to visit the Internet 450 to 402-n '.
Inside personal data end points 408-1 to 408-n among each subscriber equipment 402-1 to 402-n creates with the safety of external agent's end points 416 and is connected.Described inner personal data end points 408-1 to 408-n carries out and uses data and profile management function, as top with reference to as described in the figure 1B.Described external agent's end points 416 can provide IP address anonymization, fire wall tunnel and other security function.Described external agent's end points 416 can comprise external security visit 412, to provide safer connection by the mandate that requires to allow to be connected with the user.
Fig. 5 is the block diagram of another example of the system shown in Figure 1A.The system 500 of Fig. 5 uses privately owned social networks 506, and it is that the user creates personal account and visits the online resource of the telex network of described privately owned social networks 506 with other.Described privately owned social networks 506 can comprise the instrument such as Email, message, chat tool and the alternate manner that the user communicates with one another.Described privately owned social networks 506 can also allow the network equipment upload information of user from the user.Described user can upload image, video or other medium that are used to put up and/or share with other user of described privately owned social networks 506.Privately owned social networks 506 can be realized such as requiring to import the secure access program that username and password visits the account of self.Described user can also control the mode of other user capture personal information.Some examples of privately owned social networks 506 comprise Facebook, Twitter, LinkedIn, Plaxo and MySpace.
System 500 among Fig. 5 can realize personal profiles and personal data end points, so that the user's control to user's use data to be provided, and allows described user will use data transfer to arrive user's personal profiles.Described privately owned social networks 506 can also comprise the instrument and the resource of the use data of using the user, to allow their business information of user selection ground transmission, to pay close attention to their shopping and allow marketing personnel to locate their supplying products.
In the system 500 of Fig. 5, the user visits described privately owned social networks 506 from subscriber equipment 502-1 to 502-n.Privately owned social networks 506 comprises among n the user with the account on the described privately owned social networks 506 the personal profiles 508-1 to 508-n of each among Fig. 5.Described subscriber equipment 502-1 to 502-n comprises individual inner terminal (" the PIE ") 504-1 to 504-n that is connected to corresponding use data logging (" UDL ").Described subscriber equipment 502-1 to 502-n can be arranged to as operation as described in reference to figure 2,4 or 5.Described subscriber equipment 502-1 to 502-n can also be configured to do not have PIE 504-1 to 504-n or UDL, as shown in Figure 3, and has the personal data end points service that is realized by the external server source.Described personal profiles 508-1 to 508-n and profile data 510-1 to 510-n can be operating as use and upload to described privately owned social networks 506 so that the resource of the use data of interface to be provided to product/service marketing personnel by the user.
Described user can safeguard the profile data 510 that is independent of privately owned social networks account, but provides data and profile data 510 from profile 508 to privately owned social networks in a controlled manner.Described user can be thus with under the situation of the worry of the distribution that does not have potential employer or potential advertisement side, share comment, review, suggestion and other content as partner (fellow) privately owned social network members.Described user's account can be arranged to and realize the setting of user's data safety in conjunction with privately owned social networks.
System 500 among Fig. 5 also comprises the external agent's end points 512 with external security visit 510, and described external security visit 510 is used for by requiring to allow to guarantee the safety that is connected between user and the Internet 520 with user's the mandate that is connected.
Fig. 6 A is that explanation is carried out anonymous individual and used and follow the tracks of and the interleaving function process flow diagram of the operation of the example of synchronous method 600.Fig. 6 A has shown the function of carrying out by such as the equipment in the system of the system among Fig. 2 200.Fig. 6 A has shown the operation of being carried out by subscriber equipment 1202, subscriber equipment 2220 and website 260.
Method 600 shown in Fig. 6 A is carried out the tracking of the use that the user to the Internet makes.The content of subscriber to access Internet provides the information of purchase, shopping and other commercial trends that can be used to definite user.Described user can safeguard these data, and uses it, to come optionally distributing described data to marketing personnel and product/serve the provider based on user's interest.Business information (as advertisement) as described below, that described data can also be used to that the user can be controlled or customized user receives on the Internet connects.
The tracking of using can be carried out on the backstage when subscriber to access Internet.For example, Fig. 6 A has described: the user conversation on the Internet 604, wherein, subscriber to access Internet and from subscriber equipment 1202 and website swap data available on the Internet.In step 606, the personal data end points monitoring data on the subscriber equipment 1202 connects.Described personal data end points extracts with the user and asks the relevant data in website that connect and be connected with the user.For example, the data of extraction can comprise the link of the website 260 among identification Figure 1B.Described personal data end points uses data 608 with collected data storage for the user.As top with reference to figure 1B more specifically as described in, described user uses the data 608 can be by compiling (complie) for using data and being used.
Can also use such as being arranged to the time tracking of using on the backstage the user with another accessing internet by user equipment of subscriber equipment 1202 crew-served subscriber equipmenies 2220.For example, the user can use personal computer as the primary visit of user to the Internet.In the example shown in Fig. 6 A, described user's personal computer is a subscriber equipment 1202, and it can be desktop computer or portable computer or be user configured other workstation arbitrarily.When the user left the normal position of subscriber equipment 1202, described user can also use ambulatory handheld computing machine or smart phone (smartphone) or net book or other mobile computing device to visit the Internet.Described mobile device is the subscriber equipment 2220 in the example shown in Fig. 6 A.Described user is in step 624 access the Internet in the session of subscriber equipment 2220.Described subscriber equipment 2220 can comprise mobile personal data end points, and it is used for extracting the data relevant with the website of user capture in the similar mode of session of carrying out from subscriber equipment 1202 in step 604 to the user.The connection that the mobile personal data end points of operation is set up at subscriber equipment 2220 in step 626 from the user on subscriber equipment 2220 is extracted the user and is used data.Described user's use data are stored as the use data in step 628.
Example shown in Fig. 6 A has illustrated how unique user uses two subscriber equipmenies to safeguard and use data logging.Described example also illustrated the user how synchronous described use data, make the user need on two different equipment, not safeguard two different use data loggings.When described user thought synchronously his use data, described user at first made subscriber equipment 1202 be connected to subscriber equipment 2220, so that communication link to be provided, shown in step 614.Described subscriber equipment 2220 is accepted connection in step 634, and the process of the synchronous described use data of federated user equipment 1202 beginnings, shown in step 616.The process of synchrodata can comprise handshake between two equipment, with the exchanges data between the synchronizing process of controlling two equipment joint operations, shown in step 616 and 636.Described exchanges data can be carried out at both direction, makes the result of synchronous described equipment be used for obtaining two mirror image reflections between the use data in the equipment.Described exchanges data can also be carried out in a direction, makes one to use data warehouse (usagedata store) to be used the new data of data warehouse to upgrade from another.Described subscriber equipment 202,220 can comprise status data, its be used to store synchronous daily record and such as its stored time and date about using the data of data.Described status data is by providing about being helped described synchronizing process by the information of synchronous new data.
Note, among Fig. 6 A, when swap data between user and website 260,, use data and user's personal information not to be passed to website 260 in step 644.In addition, in step 624, the mechanism that the third party website is used to obtain user's personal information or uses data has been forbidden in the connection of creating by the personal data end points between user and the website 260.Fig. 6 B is the process flow diagram of operation of example of method of the transmission of the explanation use data that are used to control the user.Exemplary method shown in Fig. 6 B may be implemented as the computer program of conduct in the part of the connection of monitoring user on the Internet.Explain below with reference to Fig. 6 B, described exemplary method is the part of the function of personal data end points 208 execution among Fig. 2.Should be appreciated that it is operation for the method among the key diagram 6B that the personal data end points 208 among Fig. 2 is used as example, rather than be confined to the realization of any specific for the operation that makes the exemplary method among Fig. 6 B.
When the user began the process of the media content on the access websites, described user used the request of 204 (see figure 2)s transmission medium from user's individual, and for illustrative purposes, it is web browser in this manual that described individual uses 207.Along with the network interface of described web browser by subscriber equipment 1202 is connected to the Internet, described user selects to be used at the station address that transmits on the Internet (or " URL ") in the medium request.Described web browser uses the request that is formatted as " HTTP " request, and this is that those of ordinary skill in the art is well-known.In system shown in Figure 2 200, in step 650, described personal data end points 208 receives described medium request.
In step 652, described personal data end points 652 user's usage log use in the data logging the described medium request of record or with the relevant data of described medium request.Recorded data can be in following any:
1. address, targeted website, it can be the URL, IP address (if known) of for example website or other identifier arbitrarily
2. transmission time
3. transmit the date
4. the frequent search terms that uses
5. use request of data side, if be included in the medium request, for example, and cookie, it can comprise following information:
● distribute to user's user identifier before the website
● station address or URL
● the user is to the preference of website
● account access information, as username and password
Use request of data side if described medium request comprises, then personal data end points 652 can remove it from the medium request.Described use request of data side can also be modified, and perhaps, under certain conditions, described use request of data can be to be allowed to the request of retaining part medium.For example, if described use request of data side has been stored in the copy that uses the use request of data side in the data logging before being, then it can be allowed to be retained in the medium request.
In step 656, described medium request is being sent to the targeted website on the Internet.Described website is by responding described medium request at the described media content of transmission on the Internet.Described media content is received by the personal data end points in step 658.Described media content can comprise the advertisement link of embedding and use request of data side.Determining the user when described website is when visiting described website for the first time, and the use request of data can be to be comprised.
Use request of data side if described media content comprises, then in step 660, described personal data end points can remove described use request of data side from media content.When described use request of data side is " cookie ", be called as the process of " cookie crushing (cookie destruction) " by execution, can abandon described use request of data side.Described use request of data side can also be modified before browser at the transmission media content.In step 662, the medium request responding then is passed to described browser.Described browser can be then based on sending ad-request in the advertisement link of the embedding in the media content that transmits on the Internet.Described ad-request is received by the personal data end points in step 664.The step 666 that is delivered in of ad-request is terminated.
In example implementation, described ad-request can be reconfigured.For example, the request of ad content can be redirected to the advertisement source of the ad content that provides consistent with user's interest.Fig. 6 C is the interleaving function process flow diagram of operation of the example of explanation personal data end points 202 (as described in reference to the figure 2) method 670 of carrying out the Advertisement Server function.In the example of Fig. 6 C, for example, described user can be in step 678 access websites, with the web page browsing session of startup with the website.In step 684,, start and being connected of website 260 (Fig. 2) by monitoring the personal data end points of described connection.Described personal data end points 202 transmits the request that is used to be connected to the website on the website 260.In step 680, webpage is returned to subscriber equipment 202 in described website, and described webpage can comprise the advertisement link of embedding.Described medium request responding is transmitted by personal data end points 202.In step 682, described subscriber equipment 202 is handled described webpage, and it can be included in the part that shows described medium on user's the display device.
Described subscriber equipment 202 also sends and the relevant advertising media's request of the advertisement link of embedding the media content that receives from webpage.Described personal data end points 202 receives the request of described advertising media, and this request is redirected to personal advertisement service 138 (Figure 1B).In step 692, described personal advertisement service is revised advertising media's request by for example advertising media's request being replaced with advertising media's request relevant with user's interest.Described personal advertisement service 138 can comprise the preference and the attribute of original advertising media's request.For example, the request of described advertising media can be included in the size and the position details of display ads on user's the display.The described advertising media's request that reconfigures comprises the different objects corresponding to the website of the described user's of coupling interest.Described personal advertisement service 138 can also be replaced into alternative advertisement with the request of described advertising media in step 692.
In step 688, described personal advertisement service 138 responses provide the advertisement of revision, and it is displayed on the subscriber equipment 202.The then advertisement on step 690 accession page of described user.
Fig. 7 is that explanation carry out to use is followed the tracks of in the system that comprises the anonymity proxy server and the interleaving function process flow diagram of the operation of synchronous method 700.In the exemplary method 700 in Fig. 7, described user is in step 704 access the Internet, with the session of startup with website 116 (Figure 1A).Described connection is activated and monitors that data are used in it storage that comprises step 708 by the personal data end points in step 706.In step 744, described connection start also be included in being connected of website 116 in will itself be configured to the anonymity proxy 114 of end points.All described users are being to be undertaken by the personal data end points on described anonymity proxy 114 and the subscriber equipment 202 with being connected of provider on the Internet.Described anonymity proxy 114 is come the described connection of anonymization by substituting user's IP address in the connection request with different IP addresses.During session, described data are transmitted between the webserver 260 and anonymity proxy 114, and described anonymity proxy 114 has been finished user's connection.The described webserver 260 is under without any the situation about the information of user or subscriber equipment, by anonymity proxy 114 and described telex network.Described user anonymity ground participates in session.
Exemplary method shown in Figure 7 comprises such step: in step 722 and 724, the user uses subscriber equipment 2220 to start session with the webserver 116.Described session can be connected by anonymity in the connection of step 744 by anonymity.Fig. 7 has shown also that in step 710,712,730 and 732 user on the subscriber equipment 1202 uses data how synchronous with subscriber equipment 2220.
Fig. 8 is that explanation is used outside personal data end points 304 (Fig. 3) to carry out to use and followed the tracks of and the interleaving function process flow diagram of the operation of synchronous method 800.The explanation of the interleaving function process flow diagram among Fig. 8 is carried out with reference to the system among Fig. 3 300.
In Fig. 3, described subscriber equipment 302-1 to 302-n is arranged to by external proxy server 304 access the Internet.Described external proxy server 304 comprises personal data end points 310-1 to 310-n and is arranged to use data logging 308-1 to 308-n by each subscriber equipment 302-1 to 302-n of external proxy server 304 access the Internet.
Refer back to Fig. 8, for illustrated example, described user, promptly the user 1, uses user 1 equipment 302-1, in the session of step 804 startup on the Internet.Communication on the Internet is to be undertaken by the personal data end points 310-1 corresponding to the user of operation on the external proxy server 304, shown in step 830.Described personal data end points 310-1 is by following the tracks of user's Internet service and use about the information stores of user capture website in user profile data 832.The connection of described personal data end points 310-1 external resource on step 850 is also finished website 260.
Fig. 8 has shown that also user 1 uses second subscriber equipment, mobile subscriber 1 equipment 302-1 ' to visit the Internet, and described equipment can be the portable computing device that is operating as the mobile expansion of user's primary computing environment in user 1 equipment 302-1.Described user uses mobile subscriber's 1 equipment 302-1 ' access the Internet in step 814.Described user is that the identical personal data end points 310-1 on the outside personal data end points 304 of the user 1 equipment 302-1 by being used to connect the user carries out to the connection of the Internet.In step 832, be directed to arbitrary equipment that the user is used for being connected to the Internet, for connecting, all users to the Internet collect described use data logging.
Fig. 9 is that explanation carry out to use is followed the tracks of in the system that comprises outside personal data end points 304 and anonymity proxy 114 (Figure 1A) shown in Figure 3 and the interleaving function process flow diagram of the operation of synchronous method 900.Method 900 among Fig. 9 comprises such step: respectively in step 904 and 914, use user 1 equipment 302-1 or the session of mobile subscriber's 1 equipment 302-1 ' startup on the Internet.Described connection is to be undertaken by the personal data end points on the external proxy server 304 in step 924.Described connection also comprises the anonymity proxy 114 of step 934.
As above described with reference to figure 7, described anonymity proxy 114 stops is transmitting user's IP address on the Internet.With the communication information of website in, described anonymity proxy with user's IP address from go to or message from the user remove.Described website and telex network, yet, only " see " anonymity proxy 114.
III, optional network
Notice, above the explanation of example implementation use the example of the Internet as the public network of operating in the example implementation.Will be understood by those skilled in the art that, below realization in the scope that defines in the claim be not limited to the use of the Internet or network.Now known arbitrarily or development, their products ﹠ services of corporate advertising in the future public or privately owned networks can be used in other example implementation.Public and privately owned network based on different structures can be used, as bluetooth, GPRS, wireless telephony network, satellite communication network, broadcasting station network, television network broadcast, cable network, communication system of power grids network and other arbitrary network that can be established a communications link by wired connection or wireless connections.
The front presents to illustrate and to be described as purpose about the explanation that realizes.It is not detailed, and the invention of claim is not limited to precise forms disclosed herein.According to the above description or put into practice the present invention and can obtain to revise and change to the present invention is different.Note also that described being implemented in can be different between the system.Claim and their equivalent have defined scope of the present invention.

Claims (30)

1. personal data end points that is arranged at the calculating hands-operation that is connected to public data network, described personal data end points comprises:
The network data interface is arranged to reception to the data of transmitting with the user who uses from least one individual, and described at least one individual uses to be arranged on public data network and transmits and receive data;
The usage data record device is arranged to from the data that received and selects to use data, and with described use data storage to using in the data logging; And
Use data filter, be arranged to the transmission of the described use data of control on public data network, and the information that is designated as private information is transmitted in prevention on public data network.
2. personal data end points as claimed in claim 1 also comprises:
The user profiles assembly is arranged to based on being stored in described user and uses use data in the data logging, produces the personal profiles of the personal information that comprises the user, and described user's personal information comprises is consuming behavioural information.
3. personal data end points as claimed in claim 2 also comprises the user profiles interface, is arranged to the user visit is provided, and is used to specify to allow third party device to visit the condition of the data in the personal profiles on network.
4. personal data end points as claimed in claim 2 also comprises:
Personal advertisement service, the advertising message request that produces when being arranged to the page medium that reception embeds in webpage when the user receives from the user, and reconfigure described advertising message request according to described user's personal profiles.
5. personal data end points as claimed in claim 1 also comprises:
The advertisement obstruction device, the advertising message request that produces when being arranged to the page medium that obstruction embeds in webpage when the user receives from the user.
6. personal data end points as claimed in claim 1 is arranged on the subscriber equipment that comprises individual's application of being used by the user and operates, and described individual uses the function that is included in network communication.
7. personal data end points as claimed in claim 6 is arranged on subscriber equipment and operates, and described personal data end points also comprises:
Sync Manager is arranged to management and uses data with the second personal data end points exchange of operating on second subscriber equipment.
8. one kind is used to control the system that is stored in the distribution of the use data on the computing machine that is configured to be connected to public data network in the electronics mode, and described system comprises:
At least one individual uses, and is arranged to the execution user's business, and it is included in and sends request of data on the public data network and receive data;
Personal data end points at the calculating hands-operation that is configured to be connected to public data network, described personal data end points is arranged to reception to the data of transmitting with the user who uses from least one individual, from the data that received, select to use data, and with described use data storage to using in the data logging; And
Use data filter, be arranged to the transmission of the described use data of control on public data network, and stop the information of on public data network, transmitting the identification user.
9. system as claimed in claim 8 also comprises:
The user profiles assembly is arranged to based on being stored in described user and uses use data in the data logging, produces the personal profiles of the personal information that comprises the user, and described user's personal information comprises consumer behaviour information; And
Personal advertisement service, the advertising message request that produces when being arranged to the page medium that reception embeds in webpage when the user receives from the user, and reconfigure described advertising message request according to described user's personal profiles.
10. system as claimed in claim 8, wherein, the personal data end points is arranged on the subscriber equipment that comprises individual's application of being used by the user and operates, and described individual uses the function that is included in network communication.
11. system as claimed in claim 10, wherein, the personal data end points is arranged on the subscriber equipment as first subscriber equipment and operates, and described personal data end points also comprises:
Sync Manager, be arranged to management and use data with the second personal agent module exchange of on second subscriber equipment, operating, the described second personal agent module is configured to be connected to public data network, reception is to the data of transmitting with the user who uses from least one mobile personal, from the data that received, select to use data, described use data storage is used in the data logging to moving, and with use data in the described mobile use data logging and the use data sync that is stored on first subscriber equipment.
12. system as claimed in claim 11, wherein, the second personal agent module is the second personal data end points.
13. system as claimed in claim 8 also comprises:
The anonymity proxy server, be arranged to reception to the data of transmitting from described user, and to from user's communications, extract identifying information.
14. system as claimed in claim 8, wherein, the described computing machine that is configured to be connected to network is the external server equipment that is arranged to storage and operation personal data end points, described external server equipment also is arranged to the user provides visit to connect, to allow the user to be connected to network, described system also comprises:
Be arranged to the operation subscriber equipment of people's application at least one by one, described subscriber equipment also comprises the personal agent client, and it is arranged to and the personal data endpoint communication, the user is used the visit of data with the control third party.
15. the method that the business information that is used to control the user transmits on public data network, described method comprises:
Receive the medium request of using from the individual on network connects, third party's resource is pointed in described medium request;
With the recording storage of medium request in the corresponding use data logging of using with described individual of user;
Send described medium request to third party's resource;
Receive response to the medium of being asked from third party's resource, described response comprises that the advertisement of at least one embedding and at least one use request of data;
Extract and use request of data side, described use request of data side is delivered to individual's application to stop;
Use the transmission response to described individual, described response comprises the advertisement of at least one embedding;
Use the corresponding ad-request of advertisement that receives with described at least one embedding from described individual; With
Ad-request is transmitted in prevention on network.
16. method as claimed in claim 15 also comprises:
On second network connects, will use the record and second in the data logging to use data logging synchronous.
17. method as claimed in claim 15 also comprises:
After stoping the step of transmitting ad-request, send the advertisement of selecting according to user's use data that substitutes.
18. method as claimed in claim 15 also comprises:
Use use data in the data logging based on being stored in the user, produce the personal profiles that comprises the userspersonal information, described personal information comprises consumer behaviour information.
19. method as claimed in claim 17 also comprises:
Reception produces described advertising message request from user's advertising message request when described user receives the page medium that embed in webpage; And
According to described individual subscriber profile, reconfigure the advertising message request.
20. method as claimed in claim 15 also comprises:
On network, extract use request of data side by the communication that receives from third party device; And
Prevention is to the response of described use request of data side.
21. system that is used on public data network, carrying out advertisement to the user, described user is connected to and is arranged to the network user device that realizes that the individual uses, described individual uses to be arranged on described public data network and communicates by letter with advertising equipment, described advertising equipment is arranged to by sending and monitoring that the use request of data side that is installed on the network user device follows the tracks of described user's use, and described system comprises:
The personal data end points of at least one network equipment, operating, described personal data end points is arranged to the data that reception is transmitted to the user who uses with individual from least one network equipment, from the data that received, select to use data, and with described use data storage to using in the data logging; And
Use data filter, be arranged to based on the configuration setting of user management and control the transmission of described use data on public data network, and stop to use request of data side from least one network equipment transmission.
22. system as claimed in claim 21 also comprises:
User profiles assembly with personal data end points joint operation, described user profiles assembly is arranged to the personal profiles that produces the user's who comprises at least one network equipment personal information based on the use data in the use data logging that is stored in described user, and described personal information comprises consumer behaviour information.
23. system as claimed in claim 21 also comprises:
Personal advertisement service with personal data end points joint operation, the advertising message request that described personal advertisement service produces when being arranged to the page medium that reception embeds in webpage when the user receives from the user, and reconfigure described advertising message request according to described user's personal profiles.
24. system as claimed in claim 21 also comprises:
With the advertisement obstruction device of personal data end points joint operation, the advertising message request that described advertisement obstruction device produces when being arranged to the page medium that obstruction embeds in webpage when the user receives from the user.
25. system as claimed in claim 21, wherein, described personal data end points is arranged at least one individual's application of operation on user's the network equipment, wherein, described at least one individual is applied on described user's the network equipment and operates, to be used by the user.
26. system as claimed in claim 25, described personal data end points also comprises:
Sync Manager is arranged to management and is being arranged to the mobile personal data end points exchange use data of operating on the mobile subscriber equipment of communicating by letter on the public network.
27. system as claimed in claim 26, wherein, mobile personal data end points on the mobile subscriber equipment is arranged to reception to the data of transmitting with the user who uses from least one mobile personal, from the data that received, select to use data, described use data storage is used in the data logging to moving, and with use data in the described mobile use data logging and the use data sync that is stored on first subscriber equipment.
28. system as claimed in claim 21 also comprises:
The anonymity proxy server is arranged to by the personal data end points and receives to the data of transmitting with user from described at least one network equipment, and to from user's communications, extract identifying information.
29. system as claimed in claim 21, wherein, described at least one network equipment is configured to: be connected to public network by the external server that is arranged to storage and operation personal data end points.
30. system as claimed in claim 21, wherein:
Described personal data end points comprises inner personal data end points and outside personal data end points;
Described at least one network equipment is configured to be connected to public network by external server;
Described inner personal data end points is stored and is configured to move at least one network user device; And
Described outside personal data end points is arranged to storage and operates described personal data end points.
CN2010106149774A 2009-12-30 2010-12-30 System and method for providing user control of the user's network usage data and personal profile information Pending CN102117463A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US12/655,413 2009-12-30
US12/655,413 US20110161172A1 (en) 2009-12-30 2009-12-30 System and method for providing user control of the user's network usage data and personal profile information

Publications (1)

Publication Number Publication Date
CN102117463A true CN102117463A (en) 2011-07-06

Family

ID=43587436

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010106149774A Pending CN102117463A (en) 2009-12-30 2010-12-30 System and method for providing user control of the user's network usage data and personal profile information

Country Status (4)

Country Link
US (1) US20110161172A1 (en)
EP (1) EP2341479A1 (en)
JP (3) JP5897256B2 (en)
CN (1) CN102117463A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104365077A (en) * 2012-03-23 2015-02-18 塞屈尔兹有限公司 Method and/or system for user authentication with targeted electronic advertising content through personal communication devices
CN104781798A (en) * 2012-11-09 2015-07-15 Kpi解决方案股份有限公司 Information processing system and information processing method
CN106357512A (en) * 2016-09-14 2017-01-25 广东欧珀移动通信有限公司 Chat message differentiated synchronization method and chat message differentiated synchronization device
CN106663258A (en) * 2014-02-26 2017-05-10 威图数据研究公司 Measurement of multi-screen internet user profiles, transactional behaviors and structure of user population through a hybrid census and user based measurement methodology
CN108476402A (en) * 2015-09-30 2018-08-31 T-移动网美国有限公司 Anonymous communication between delivering client at customer service website

Families Citing this family (45)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9542690B2 (en) 2006-07-18 2017-01-10 American Express Travel Related Services Company, Inc. System and method for providing international coupon-less discounts
US9558505B2 (en) 2006-07-18 2017-01-31 American Express Travel Related Services Company, Inc. System and method for prepaid rewards
US9430773B2 (en) 2006-07-18 2016-08-30 American Express Travel Related Services Company, Inc. Loyalty incentive program using transaction cards
BRPI0809857A2 (en) 2007-03-30 2014-09-30 Google Inc DETERMINATION OF ADVERTISING CONVERSION
US10304065B2 (en) 2007-03-30 2019-05-28 Google Llc Determining advertising conversion
US9215264B1 (en) * 2010-08-20 2015-12-15 Symantec Corporation Techniques for monitoring secure cloud based content
US8837683B2 (en) * 2010-10-10 2014-09-16 Medsign International Corporation Critical health information profile and emergency communication system
US9111113B2 (en) * 2010-11-01 2015-08-18 Microsoft Technology Licensing, Llc Trusted online advertising
US20120123870A1 (en) * 2010-11-16 2012-05-17 Genband Inc. Systems and methods for enabling personalization of data service plans
US20120158503A1 (en) 2010-12-17 2012-06-21 Ebay Inc. Identifying purchase patterns and marketing based on user mood
US8849699B2 (en) * 2011-09-26 2014-09-30 American Express Travel Related Services Company, Inc. Systems and methods for targeting ad impressions
US9626700B1 (en) 2011-09-29 2017-04-18 Amazon Technologies, Inc. Aggregation of operational data for merchandizing of network accessible services
US8776043B1 (en) 2011-09-29 2014-07-08 Amazon Technologies, Inc. Service image notifications
US20130110639A1 (en) * 2011-11-01 2013-05-02 Ebay Inc. Wish list sharing and push subscription system
US20130151589A1 (en) * 2011-11-17 2013-06-13 Market76 Computer-based system for use in providing advisory services
US8893287B2 (en) 2012-03-12 2014-11-18 Microsoft Corporation Monitoring and managing user privacy levels
US9697529B2 (en) 2012-03-13 2017-07-04 American Express Travel Related Services Company, Inc. Systems and methods for tailoring marketing
US20130246176A1 (en) 2012-03-13 2013-09-19 American Express Travel Related Services Company, Inc. Systems and Methods Determining a Merchant Persona
US9152820B1 (en) * 2012-03-30 2015-10-06 Emc Corporation Method and apparatus for cookie anonymization and rejection
JP5224224B1 (en) 2012-05-08 2013-07-03 株式会社Kpiソリューションズ Information processing system and information processing method
US9363238B2 (en) 2012-06-04 2016-06-07 Apple Inc. Repackaging demographic data with anonymous identifier
US8489469B1 (en) * 2012-08-30 2013-07-16 Elbex Video Ltd. Method and structure for simplified coding of display pages for operating a closed circuit E-commerce
US9710822B2 (en) 2012-09-16 2017-07-18 American Express Travel Related Services Company, Inc. System and method for creating spend verified reviews
US10664883B2 (en) 2012-09-16 2020-05-26 American Express Travel Related Services Company, Inc. System and method for monitoring activities in a digital channel
US11431763B2 (en) * 2012-09-28 2022-08-30 Comcast Cable Communications, Llc Personalized content delivery architecture
US10504132B2 (en) 2012-11-27 2019-12-10 American Express Travel Related Services Company, Inc. Dynamic rewards program
US9313169B2 (en) * 2013-03-14 2016-04-12 Google Inc. Providing content to devices in a cluster
US9299350B1 (en) * 2013-03-15 2016-03-29 Amazon Technologies, Inc. Systems and methods for identifying users of devices and customizing devices to users
US11017432B2 (en) * 2013-03-15 2021-05-25 Comcast Cable Communications, Llc Market exchange for user data and rewards
US9553787B1 (en) 2013-04-29 2017-01-24 Amazon Technologies, Inc. Monitoring hosted service usage
US20140344015A1 (en) * 2013-05-20 2014-11-20 José Antonio Puértolas-Montañés Systems and methods enabling consumers to control and monetize their personal data
US10395237B2 (en) 2014-05-22 2019-08-27 American Express Travel Related Services Company, Inc. Systems and methods for dynamic proximity based E-commerce transactions
US10776510B2 (en) * 2014-05-26 2020-09-15 Telecom Italia S.P.A. System for managing personal data
US9881320B2 (en) 2014-05-28 2018-01-30 Apple Inc. Targeting customer segments
EP3767896A1 (en) * 2014-08-12 2021-01-20 Eingot LLC A zero-knowledge environment based social networking engine
US10424034B1 (en) 2014-09-08 2019-09-24 Google Llc Systems and methods for protecting user identity within online content providing environments
JP6483814B2 (en) * 2014-09-16 2019-03-13 ノキア テクノロジーズ オサケユイチア Method and apparatus for anonymous access and control of service nodes
DE102015007876A1 (en) * 2015-06-22 2017-01-05 Eblocker Gmbh Network control device
US10884583B2 (en) * 2017-11-29 2021-01-05 Microsoft Technology Licensing, Llc Suppressing the collection of activity data by an operating system
US11520922B2 (en) * 2018-01-22 2022-12-06 Todd Jeremy Marlin Method for personal data administration in a multi-actor environment
US10601960B2 (en) 2018-02-14 2020-03-24 Eingot Llc Zero-knowledge environment based networking engine
US11017430B2 (en) * 2018-11-16 2021-05-25 International Business Machines Corporation Delivering advertisements based on user sentiment and learned behavior
US11620294B2 (en) * 2020-01-30 2023-04-04 Panasonic Avionics Corporation Dynamic media data management
US11954225B1 (en) 2020-11-02 2024-04-09 Wells Fargo Bank, N.A. Data privacy management
US11551251B2 (en) * 2020-11-12 2023-01-10 Rodney Yates System and method for transactional data acquisition, aggregation, processing, and dissemination in coordination with a preference matching algorithm

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080189181A1 (en) * 2007-02-05 2008-08-07 Ilan Zorman Apparatus, system and method for providing digital content to customers
CN101300561A (en) * 2005-08-30 2008-11-05 费瓦科技有限公司 Apparatus, systems and methods for targeted content delivery
US20090319329A1 (en) * 2007-07-07 2009-12-24 Qualcomm Incorporated User profile generation architecture for mobile content-message targeting

Family Cites Families (67)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5136501A (en) * 1989-05-26 1992-08-04 Reuters Limited Anonymous matching system
US6101531A (en) * 1995-12-19 2000-08-08 Motorola, Inc. System for communicating user-selected criteria filter prepared at wireless client to communication server for filtering data transferred from host to said wireless client
US6014634A (en) * 1995-12-26 2000-01-11 Supermarkets Online, Inc. System and method for providing shopping aids and incentives to customers through a computer network
US5884272A (en) * 1996-09-06 1999-03-16 Walker Asset Management Limited Partnership Method and system for establishing and maintaining user-controlled anonymous communications
US6058418A (en) * 1997-02-18 2000-05-02 E-Parcel, Llc Marketing data delivery system
US6421733B1 (en) * 1997-03-25 2002-07-16 Intel Corporation System for dynamically transcoding data transmitted between computers
US7302402B2 (en) * 1998-03-30 2007-11-27 International Business Machines Corporation Method, system and program products for sharing state information across domains
US7079230B1 (en) * 1999-07-16 2006-07-18 Sun Chemical B.V. Portable authentication device and method of authenticating products or product packaging
US20010042002A1 (en) * 1999-08-30 2001-11-15 Jeff Koopersmith Method and system for communicating targeted information
AU783072B2 (en) * 1999-11-02 2005-09-22 E-Clarity, Inc. Verbal classification system for the efficient sending and receiving of information
WO2001063314A1 (en) * 2000-02-23 2001-08-30 Nexterna, Inc. Synchronized global positioning system solution
AU2001241609A1 (en) * 2000-02-23 2001-09-03 Capital One Financial Corporation Systems and methods for providing anonymous financial transactions
WO2001065453A1 (en) * 2000-02-29 2001-09-07 Expanse Networks, Inc. Privacy-protected targeting system
US7493655B2 (en) * 2000-03-22 2009-02-17 Comscore Networks, Inc. Systems for and methods of placing user identification in the header of data packets usable in user demographic reporting and collecting usage data
US8843590B2 (en) * 2000-05-31 2014-09-23 Ebm/Ip, Llc Systems, methods and computer program products for facilitating display of content within application programs executing on electronic devices
US6611814B1 (en) * 2000-07-17 2003-08-26 International Business Machines Corporation System and method for using virtual wish lists for assisting shopping over computer networks
US7599851B2 (en) * 2000-09-05 2009-10-06 Renee Frengut Method for providing customized user interface and targeted marketing forum
JP2002091995A (en) * 2000-09-14 2002-03-29 Use:Kk Method/system for supplying advertising information and recording medium with advertising information supplying program recorded thereon
US20020055912A1 (en) * 2000-10-20 2002-05-09 Byron Buck Network and method for facilitating on-line privacy
US6779033B1 (en) * 2000-12-28 2004-08-17 Networks Associates Technology, Inc. System and method for transacting a validated application session in a networked computing environment
US7054906B2 (en) * 2000-12-29 2006-05-30 Levosky Michael P System and method for controlling and organizing Email
US20020133720A1 (en) * 2001-03-16 2002-09-19 Clickgarden Method for filtering the transmission of data on a computer network to Web domains
JP3596482B2 (en) * 2001-03-30 2004-12-02 ムサシ化成工業株式会社 Personal banner creation program
US20020147766A1 (en) * 2001-04-04 2002-10-10 Marko Vanska Operating user profiles with distributed profile model using a hybrid terminal
US20020180614A1 (en) * 2001-04-11 2002-12-05 Gonzalez Javier Janez Internet-ready communication modules
US20020165815A1 (en) * 2001-05-07 2002-11-07 International Business Machines Corporation Online marketplace with anonymous communication
WO2002091186A1 (en) * 2001-05-08 2002-11-14 Ipool Corporation Privacy protection system and method
US7188085B2 (en) * 2001-07-20 2007-03-06 International Business Machines Corporation Method and system for delivering encrypted content with associated geographical-based advertisements
FR2828362B1 (en) * 2001-08-02 2003-12-05 Gabriel Gross COMMUNICATION METHOD FOR A CONTROLLED EXCHANGE OF DATA BETWEEN A CLIENT TERMINAL AND A NETWORK OF HOST SITES AND PROTECTION SERVER ASSEMBLY FOR THE IMPLEMENTATION OF THIS METHOD
JP4658439B2 (en) * 2002-02-20 2011-03-23 株式会社電通 Information providing device, control device, and program
EP1481514B1 (en) * 2002-03-04 2008-06-25 Operax AB A method for providing topology awareness information within an ip network
US7096200B2 (en) * 2002-04-23 2006-08-22 Microsoft Corporation System and method for evaluating and enhancing source anonymity for encrypted web traffic
US7668885B2 (en) * 2002-09-25 2010-02-23 MindAgent, LLC System for timely delivery of personalized aggregations of, including currently-generated, knowledge
WO2005001660A2 (en) * 2003-06-25 2005-01-06 Anonymizer, Inc. Secure network privacy system using proxy server
US7921152B2 (en) * 2003-07-17 2011-04-05 International Business Machines Corporation Method and system for providing user control over receipt of cookies from e-commerce applications
US20070067297A1 (en) * 2004-04-30 2007-03-22 Kublickis Peter J System and methods for a micropayment-enabled marketplace with permission-based, self-service, precision-targeted delivery of advertising, entertainment and informational content and relationship marketing to anonymous internet users
CN101023419B (en) * 2004-05-14 2010-06-16 模比莱普斯有限公司 Method of providing a web page with inserted content
US7873695B2 (en) * 2004-05-29 2011-01-18 Ironport Systems, Inc. Managing connections and messages at a server by associating different actions for both different senders and different recipients
US7870200B2 (en) * 2004-05-29 2011-01-11 Ironport Systems, Inc. Monitoring the flow of messages received at a server
US8688590B2 (en) * 2004-10-14 2014-04-01 Google Inc. System and method to strengthen advertiser and consumer affinity
AU2005321876B2 (en) * 2004-12-31 2011-07-07 Ntrepid, Llc System for protecting identity in a network environment
WO2006081680A1 (en) * 2005-02-07 2006-08-10 Adzilla, Inc. Method and system of targeting content
US7617525B1 (en) * 2005-06-21 2009-11-10 Alto Ventures, Inc. System and method for connectionless client-server communications
US20070136136A1 (en) * 2005-12-09 2007-06-14 Thintropy Inc. Method of intercepting and replacing advertising content
US7967820B2 (en) * 2006-02-07 2011-06-28 P Tech, Llc. Methods and devices for trauma welding
US20070187266A1 (en) * 2006-02-15 2007-08-16 Porter Gilbert D Method, apparatus, and system for tracking unique items
US20070239722A1 (en) * 2006-03-30 2007-10-11 Phillips Mark E Distributed user-profile data structure
US8784435B2 (en) * 2006-06-13 2014-07-22 Intuitive Surgical Operations, Inc. Surgical system entry guide
US20080064931A1 (en) * 2006-06-13 2008-03-13 Intuitive Surgical, Inc. Minimally invasive surgical illumination
US8054289B2 (en) * 2006-12-01 2011-11-08 Mimic Technologies, Inc. Methods, apparatus, and article for force feedback based on tension control and tracking through cables
US20080228597A1 (en) * 2007-03-15 2008-09-18 Robert Daniel Sondles Gift Exchange
US8301787B2 (en) * 2007-03-22 2012-10-30 Red Hat, Inc. Selective use of anonymous proxies
US20090017796A1 (en) * 2007-07-09 2009-01-15 Telefonaktiebolaget Lm Ericsson (Publ) Methods and systems for communicating between ims and non-ims networks
US8478862B2 (en) * 2007-07-13 2013-07-02 Front Porch, Inc. Method and apparatus for internet traffic monitoring by third parties using monitoring implements
WO2009094657A1 (en) * 2008-01-26 2009-07-30 Citrix Systems, Inc. Systems and methods for fine grain policy driven cookie proxying
US9122749B2 (en) * 2009-02-04 2015-09-01 Popular Metrics, Inc. Internet based system and method for wagering on an artist
US8554718B2 (en) * 2008-02-12 2013-10-08 Rockstar Consortium Us Lp Method and system for client context dissemination for web-based applications
US8522271B2 (en) * 2008-02-14 2013-08-27 Qualcomm Incorporated Methods and apparatuses for sharing user profiles
US8521892B2 (en) * 2008-02-29 2013-08-27 Red Hat, Inc. Method and apparatus for controlling web page advertisement through incentives and restrictions
JP2009230644A (en) * 2008-03-25 2009-10-08 Katsuyoshi Okawa Information providing system
US8392911B2 (en) * 2008-05-16 2013-03-05 Microsoft Corporation Download discovery for web servers
WO2010049919A1 (en) * 2008-10-31 2010-05-06 France Telecom Targetted banner ads
ES2802461T3 (en) * 2009-03-23 2021-01-19 Kobo Products Inc Self-dispersing coated metal oxide powder and process for production and use
US20100306052A1 (en) * 2009-05-29 2010-12-02 Zachary Edward Britton Method and apparatus for modifying internet content through redirection of embedded objects
US20110010415A1 (en) * 2009-07-13 2011-01-13 Hitachi, Ltd. Personal information bank system
US9128281B2 (en) * 2010-09-14 2015-09-08 Microsoft Technology Licensing, Llc Eyepiece with uniformly illuminated reflective display
EP2708484B1 (en) * 2012-09-18 2015-02-11 Ricoh Company Ltd. Sheet processing apparatus, image forming system, and method of enhancing folding of sheet bundle

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101300561A (en) * 2005-08-30 2008-11-05 费瓦科技有限公司 Apparatus, systems and methods for targeted content delivery
US20080189181A1 (en) * 2007-02-05 2008-08-07 Ilan Zorman Apparatus, system and method for providing digital content to customers
US20090319329A1 (en) * 2007-07-07 2009-12-24 Qualcomm Incorporated User profile generation architecture for mobile content-message targeting

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104365077A (en) * 2012-03-23 2015-02-18 塞屈尔兹有限公司 Method and/or system for user authentication with targeted electronic advertising content through personal communication devices
CN104781798A (en) * 2012-11-09 2015-07-15 Kpi解决方案股份有限公司 Information processing system and information processing method
CN106663258A (en) * 2014-02-26 2017-05-10 威图数据研究公司 Measurement of multi-screen internet user profiles, transactional behaviors and structure of user population through a hybrid census and user based measurement methodology
CN108476402A (en) * 2015-09-30 2018-08-31 T-移动网美国有限公司 Anonymous communication between delivering client at customer service website
CN106357512A (en) * 2016-09-14 2017-01-25 广东欧珀移动通信有限公司 Chat message differentiated synchronization method and chat message differentiated synchronization device

Also Published As

Publication number Publication date
US20110161172A1 (en) 2011-06-30
JP2016149137A (en) 2016-08-18
JP2017215968A (en) 2017-12-07
JP6158379B2 (en) 2017-07-05
EP2341479A1 (en) 2011-07-06
JP6515136B2 (en) 2019-05-15
JP5897256B2 (en) 2016-03-30
JP2011138518A (en) 2011-07-14

Similar Documents

Publication Publication Date Title
CN102117463A (en) System and method for providing user control of the user's network usage data and personal profile information
US9390197B2 (en) Building a social graph using sharing activity of users of the open web by updating an edge representing a category type
US20120078708A1 (en) System and Method for Recording and Analyzing Internet Browser Traffic Independent of Individual or Specific Digital Platforms or Websites
TWI462565B (en) System and method for targeting data to users on mobile devices
US20080228598A1 (en) Providing marketplace functionality in a business directory and/or social-network site
US20140279045A1 (en) Cross-domain id synchronization in online advertisement
CN104054055A (en) Identifying and tracking user activity when using networked devices based on associations between identifiers for physical devices or software applications
KR20100135968A (en) Data collection and targeted advertising systems and methods
JP2012506098A (en) Method and system for displaying internet advertising media using ETag
EP2862338B1 (en) Method, server, and client for pushing and displaying splash screen
KR20110076988A (en) Managing internet advertising and promotional content
EP2877977A1 (en) Determining a correlation between presentation of a content item and a transaction by a user at a point of sale terminal
CN106228390A (en) The monitoring of the advertisement method and the corresponding reward voucher that utilize electronic coupons use terminal
CN106796695A (en) Using the conversion and identification installed
KR20200040594A (en) A social shopping link generating method of identifying user's sharing activities easily and providing reward
US20190102795A1 (en) Systems and methods for monitoring and evaluating data
US20120226538A1 (en) Advertising pricing system using striped aggressive discounting and shared audience auctions
KR101446463B1 (en) Brief news providing server and method for providing news thereof
US20240078146A1 (en) System and Method for Determining Website User Identity
JP7440019B2 (en) Information processing device, terminal device, information processing method, and program
KR20200040702A (en) A social shopping link generating method of identifying user's sharing activities easily and providing reward
KR101644403B1 (en) Promotion offer server and method using the Web site
KR20040049892A (en) Method and Apparatus for On-Line Shopping based on Peer-to-Peer for Couple Members
CN114723505A (en) Service charging method and device
Schmidt 12: Data Collection in the Age of Surveillance Capitalism

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: NAVTEQ LLC.

Free format text: FORMER OWNER: NAAFTECK NORTH AMERICA LTD.

Effective date: 20130205

C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20130205

Address after: Holland HOFEN feld

Applicant after: NAVTEQ B.V.

Address before: Illinois State

Applicant before: Navteq North America LLC

CB02 Change of applicant information

Address after: Holland HOFEN feld

Applicant after: HERE GLOBAL BV

Address before: Holland HOFEN feld

Applicant before: NAVTEQ B.V.

COR Change of bibliographic data
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Holland Ian Deho Finn

Applicant after: HERE GLOBAL BV

Address before: Holland HOFEN feld

Applicant before: HERE GLOBAL BV

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20110706